Events

Year All

QIS’25 Asian Quantum Information Science Conference 📅 Date: August 4 to August 8, 2025 📍Venue : Grand Hall of the Lee Shau Kee Lecture Centre, Centennial Campus, the University of Hong Kong (HKU) Hosted by: Quantum Information and Computation Initiative (QICI) of the HKU School of Computing and Data Science HK Institute of Quantum Science & Technology (HKIQST) The AQIS’25 conference will focus on quantum information processing, communication, and cryptography, bridging the fields of quantum physics, computer science, mathematics, and information technologies. As the natural successor of EQIS’01-EQIS’05 and AQIS’06-AQIS’24, AQIS’25 will feature invited talks, selected oral and poster presentations, as well as other activities. Conference Topics Include: Quantum computation and simulation, algorithms, and complexity Quantum information theory Concepts, methods, and tools against decoherence Quantum cryptography Quantum communications experiments and theory Quantum metrology Quantum technologies (optics, NMR, solid state, etc.) Quantum circuit, computer design, and architecture Quantum programming languages and semantics Important Dates: Talk Submission Deadline: April 25, 2025 Poster-only Submission Deadline: May 16, 2025 Notification of Acceptance: May 30, 2025 Final Manuscript Deadline: June 30, 2025 Early Registration Deadline: June 30, 2025 (all deadlines are until 23:59 anywhere on Earth) Invited Speakers: Rotem Arnon-Friedman (Weizman Institute of Science) Warit Asavanant (University of Tokyo) Debbie Leung (University of Waterloo) Chaoyang Lu (University of Science and Technology of China) Chiao-Hsuan Wang (National Taiwan University) Additional speakers to be announced… Sponsors: HKU School of Computing and Data Science HK Institute of Quantum Science & Technology (HKIQST) QICI Join us at AQIS’25 for a deep dive into the exciting world of quantum information and computation! The webpage address of AQIS 2025 http ://aqis-conf.org/2025/
Quantum Key Distribution (QKD) offers information-theoretic security but relies critically on authenticated classical channels for post-processing steps (e.g., basis sifting and key reconciliation). Without authentication, these channels are vulnerable to man-in-the-middle attacks. Traditional methods require Alice and Bob to pre-share symmetric keys via physical meetings—a solution incompatible with multi-user QKD networks. We experimentally demonstrate a practical solution using post-quantum signature algorithms to authenticate QKD classical channels. This approach was validated under multiple QKD network topologies in laboratory environments and a real-world metropolitan QKD network operating continuously for 36 days. Our implementation provides quantum-resistant security while uniquely requiring only short-term security (e.g., ~1 second during authentication), contrasting with long-term security assumptions for post-quantum encryption. Additionally, we propose a quantum-teleportation-based protocol for message authentication that simultaneously ensures confidentiality—enabling secure key reconciliation in QKD.

Prof. Liujun WANG

After a brief introduction to quantum nonlocality, we propose a set of conditions on the joint probabilities as a test of genuine multipartite nonlocality, and it turns out that all entangled symmetric multipartite qubit states pass this test. In the following we generalize this test to a family of Hardy-type tests, which can detect different degrees of nonlocality ranging from standard to genuine multipartite nonlocality. At last, we explore network nonlocality sharing in an n-branch generalized star network scenario with m observers in each branch and k settings per observer.

Prof. Qing CHEN